| 000 | 05227cam a2200565 i 4500 | ||
|---|---|---|---|
| 999 |
_c10563 _d10563 |
||
| 001 | 880672205 | ||
| 005 | 20201005142058.0 | ||
| 006 | m o d | ||
| 007 | cr ||| | ||
| 008 | 140527r2015 ii a ob 001 0 eng | ||
| 010 | _a2014020190 | ||
| 020 | _z9788126556236 | ||
| 035 | _a(OCoLC)880672205 | ||
| 037 |
_a9144F636-2885-405B-8EC3-BC76273EF2BA _bOverDrive, Inc. _nhttp://www.overdrive.com |
||
| 040 |
_aDLC _erda _beng _cDLC _dYDX _dOCLCO _dIDEBK _dN$T _dTEFOD _dDG1 _dE7B _dYDXCP _dEG-NcFUE |
||
| 042 | _apcc | ||
| 050 | 1 | 4 |
_aQA76.585 _b.A23 2014 |
| 072 | 7 |
_aCOM _x013000 _2bisacsh |
|
| 072 | 7 |
_aCOM _x014000 _2bisacsh |
|
| 072 | 7 |
_aCOM _x018000 _2bisacsh |
|
| 072 | 7 |
_aCOM _x067000 _2bisacsh |
|
| 072 | 7 |
_aCOM _x032000 _2bisacsh |
|
| 072 | 7 |
_aCOM _x037000 _2bisacsh |
|
| 072 | 7 |
_aCOM _x052000 _2bisacsh |
|
| 082 | 0 | 0 |
_a004.6782 _223 _bA.I.C |
| 100 | 1 |
_aAbbadi, Imad M., _eauthor. |
|
| 245 | 1 | 0 |
_aCloud management and security / _cImad M. Abbadi. |
| 260 |
_aNew Delhi : _bWiley, _c2015. |
||
| 300 |
_axxii, 216 pages ; _c24 cm. |
||
| 336 |
_atext _2rdacontent. |
||
| 337 |
_acomputer _2rdamedia. |
||
| 338 |
_aonline resource _2rdacarrier. |
||
| 500 | _acomputer bookfair2016 | ||
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aPreface References 1 Introduction 1.1 Overview 1.2 Cloud definition 1.3 Cloud evolution 1.4 Cloud services 1.5 Cloud deployment types 1.6 Main challenges of Clouds 1.7 Summary 1.8 Exercises Part One Cloud management 2 Cloud Structure 2.1 Introduction 2.2 Infrastructure components 2.3 Cloud Layers 2.4 Cloud relations 2.5 Cloud dynamics 2.6 Data types 2.7 Summary 2.8 Exercises 3 Fundamentals of Cloud management 3.1 Introduction 3.2 Clouds management services 3.3 Virtual control center 3.4 Prerequisite input-data for the management services 3.5 Management of user requirements 3.6 Summary 3.7 Exercises 4 Cloud properties 4.1 Introduction 4.2 Adaptability property 4.3 Resilience property 4.4 Scalability property 4.5 Availability property 4.6 Reliability property 4.7 Security and privacy property 4.8 Business model 4.9 Summary 4.10 Exercises 5 Automated management services 5.1 Introduction 5.2 Virtual layer self-managed services 5.3 Virtual services interdependency 5.4 Application layer self-managed services 5.5 Application services interdependency 5.6 Security and privacy by design 5.7 Multi-tier application deployment in the Cloud 5.8 Main challenges and requirements 5.9 Summary 5.10 Exercises Part Two Clouds security fundamentals 6 Background 6.1 Topics flow 6.2 Trusted Computing 6.3 Summary 7 Challenges for establishing trust in Clouds 7.1 Introduction 7.2 Effects of Cloud dynamism on trust relationships 7.3 Challenges 7.4 Summary 7.5 Exercises 8 Establishing trust in Clouds 8.1 Introduction 8.2 Organization requirements 8.3 Framework requirements 8.4 Device properties 8.5 Framework architecture 8.6 Required software agents 8.7 Framework workflow 8.8 Discussion and analysis 8.9 Summary 8.10 Exercises 9 Clouds chains of trust 9.1 Introduction 9.2 Software agents revision 9.3 Roots of and chains of trust definition 9.4 Intra-layer chains of trust 9.5 Trust across layers 9.6 Summary 9.7 Exercises 10 Provenance in Clouds 10.1 Introduction 10.2 Motivating scenarios 10.3 Log records management and requirements 10.4 Framework domain architecture 10.5 Framework software agents 10.6 Framework workflow 10.7 Threat analysis 10.8 Discussion and future directions 10.9 Exercises 11 Insiders 11.1 Introduction 11.2 Insiders definition 11.3 Conceptual models 11.4 Summary 11.5 Exercises Part Three Practical examples 12 Real life examples 12.1 Open Stack 12.2 Amazon web services 12.3 Component architecture 12.4 Prototype 12.5 Summary 13 Case Study 13.1 Scenario 13.2 Home healthcare architecture in the Cloud 13.3 Insiders analysis for home healthcare 13.4 Cloud threats | |
| 506 | _aAvailable to OhioLINK libraries. | ||
| 520 |
_a"This book discusses the foundations of Cloud computing, and covers in detail two main aspects of Cloud computing"-- _cProvided by publisher. |
||
| 650 | 0 | _aCloud computing. | |
| 650 | 0 |
_aWeb services. _9970 |
|
| 650 | 0 | _aComputer security. | |
| 655 | 4 | _aElectronic books. | |
| 710 | 2 | _aOhio Library and Information Network. | |
| 730 | 0 |
_aWiley online library. _5OCU. |
|
| 730 | 0 |
_aWiley InterScience ebooks. _5OCU. |
|
| 776 | 0 | 8 |
_iPrint version: _aAbbadi, Imad M., author. _tCloud management and security _dChichester, West Sussex ; Hoboken, NJ : Wiley, 2014 _z9781118817094 _w(DLC) 2014011409. |
| 856 | 4 | 0 |
_3Wiley Online Library : _uhttp://dx.doi.org/10.1002/9781118817087 _zConnect to resource online |
| 856 | 4 | 0 |
_3Wiley Online Library : _uhttp://proxy.ohiolink.edu:9099/login?url=http://dx.doi.org/10.1002/9781118817087 _zConnect to resource online (Off Campus Access) |
| 942 |
_2ddc _cBK |
||